mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 21:02:22 +01:00
531 lines
No EOL
19 KiB
JSON
531 lines
No EOL
19 KiB
JSON
[
|
||
{
|
||
"id": 252131233,
|
||
"name": "exphub",
|
||
"full_name": "zhzyker\/exphub",
|
||
"owner": {
|
||
"login": "zhzyker",
|
||
"id": 32918050,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/32918050?v=4",
|
||
"html_url": "https:\/\/github.com\/zhzyker"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zhzyker\/exphub",
|
||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||
"fork": false,
|
||
"created_at": "2020-04-01T09:33:35Z",
|
||
"updated_at": "2020-12-31T18:19:36Z",
|
||
"pushed_at": "2020-11-07T05:55:00Z",
|
||
"stargazers_count": 2220,
|
||
"watchers_count": 2220,
|
||
"forks_count": 629,
|
||
"forks": 629,
|
||
"watchers": 2220,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 302553989,
|
||
"name": "vulmap",
|
||
"full_name": "zhzyker\/vulmap",
|
||
"owner": {
|
||
"login": "zhzyker",
|
||
"id": 32918050,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/32918050?v=4",
|
||
"html_url": "https:\/\/github.com\/zhzyker"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zhzyker\/vulmap",
|
||
"description": "Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530",
|
||
"fork": false,
|
||
"created_at": "2020-10-09T06:34:36Z",
|
||
"updated_at": "2020-12-31T13:02:11Z",
|
||
"pushed_at": "2020-12-15T02:33:45Z",
|
||
"stargazers_count": 654,
|
||
"watchers_count": 654,
|
||
"forks_count": 116,
|
||
"forks": 116,
|
||
"watchers": 654,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 307998445,
|
||
"name": "CVE-2020-14882",
|
||
"full_name": "jas502n\/CVE-2020-14882",
|
||
"owner": {
|
||
"login": "jas502n",
|
||
"id": 16593068,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||
"html_url": "https:\/\/github.com\/jas502n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2020-14882",
|
||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||
"fork": false,
|
||
"created_at": "2020-10-28T11:43:37Z",
|
||
"updated_at": "2020-12-28T16:46:55Z",
|
||
"pushed_at": "2020-11-16T04:23:09Z",
|
||
"stargazers_count": 203,
|
||
"watchers_count": 203,
|
||
"forks_count": 38,
|
||
"forks": 38,
|
||
"watchers": 203,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 308145197,
|
||
"name": "CVE-2020-14882",
|
||
"full_name": "s1kr10s\/CVE-2020-14882",
|
||
"owner": {
|
||
"login": "s1kr10s",
|
||
"id": 5374475,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5374475?v=4",
|
||
"html_url": "https:\/\/github.com\/s1kr10s"
|
||
},
|
||
"html_url": "https:\/\/github.com\/s1kr10s\/CVE-2020-14882",
|
||
"description": "CVE-2020–14882 by Jang",
|
||
"fork": false,
|
||
"created_at": "2020-10-28T21:28:12Z",
|
||
"updated_at": "2020-12-28T17:28:26Z",
|
||
"pushed_at": "2020-10-29T03:57:09Z",
|
||
"stargazers_count": 26,
|
||
"watchers_count": 26,
|
||
"forks_count": 19,
|
||
"forks": 19,
|
||
"watchers": 26,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 308184758,
|
||
"name": "-Patched-McMaster-University-Blind-Command-Injection",
|
||
"full_name": "Umarovm\/-Patched-McMaster-University-Blind-Command-Injection",
|
||
"owner": {
|
||
"login": "Umarovm",
|
||
"id": 25722145,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25722145?v=4",
|
||
"html_url": "https:\/\/github.com\/Umarovm"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Umarovm\/-Patched-McMaster-University-Blind-Command-Injection",
|
||
"description": "(patched) This targets McMaster University's website and takes advantage of CVE-2020-14882 in the outdated version of WebLogic Server (12.2.1.3.0), which is present in the university's subdomains, mosaic.mcmaster.ca and epprd.uts.mcmaster.ca.",
|
||
"fork": false,
|
||
"created_at": "2020-10-29T01:28:41Z",
|
||
"updated_at": "2020-12-04T02:16:03Z",
|
||
"pushed_at": "2020-12-04T02:16:01Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 308238126,
|
||
"name": "CVE-2020-14882",
|
||
"full_name": "RedTeamWing\/CVE-2020-14882",
|
||
"owner": {
|
||
"login": "RedTeamWing",
|
||
"id": 25416365,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25416365?v=4",
|
||
"html_url": "https:\/\/github.com\/RedTeamWing"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RedTeamWing\/CVE-2020-14882",
|
||
"description": "CVE-2020-14882 Weblogic-Exp",
|
||
"fork": false,
|
||
"created_at": "2020-10-29T06:30:30Z",
|
||
"updated_at": "2020-12-22T09:47:47Z",
|
||
"pushed_at": "2020-10-29T06:36:01Z",
|
||
"stargazers_count": 14,
|
||
"watchers_count": 14,
|
||
"forks_count": 8,
|
||
"forks": 8,
|
||
"watchers": 14,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 308343789,
|
||
"name": "cve-2020-14882",
|
||
"full_name": "0thm4n3\/cve-2020-14882",
|
||
"owner": {
|
||
"login": "0thm4n3",
|
||
"id": 12746014,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12746014?v=4",
|
||
"html_url": "https:\/\/github.com\/0thm4n3"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0thm4n3\/cve-2020-14882",
|
||
"description": "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882",
|
||
"fork": false,
|
||
"created_at": "2020-10-29T13:53:31Z",
|
||
"updated_at": "2020-10-31T13:03:28Z",
|
||
"pushed_at": "2020-10-31T13:03:26Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 308374913,
|
||
"name": "cve-2020-14882",
|
||
"full_name": "wsfengfan\/cve-2020-14882",
|
||
"owner": {
|
||
"login": "wsfengfan",
|
||
"id": 33821840,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4",
|
||
"html_url": "https:\/\/github.com\/wsfengfan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/wsfengfan\/cve-2020-14882",
|
||
"description": "CVE-2020-14882 EXP 回显",
|
||
"fork": false,
|
||
"created_at": "2020-10-29T15:44:23Z",
|
||
"updated_at": "2020-12-06T17:09:24Z",
|
||
"pushed_at": "2020-11-09T09:55:10Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 308605927,
|
||
"name": "CVE-2020-14882",
|
||
"full_name": "alexfrancow\/CVE-2020-14882",
|
||
"owner": {
|
||
"login": "alexfrancow",
|
||
"id": 23419929,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23419929?v=4",
|
||
"html_url": "https:\/\/github.com\/alexfrancow"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-14882",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-10-30T11:07:11Z",
|
||
"updated_at": "2020-10-31T15:57:21Z",
|
||
"pushed_at": "2020-10-31T15:57:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 308716809,
|
||
"name": "CVE-2020-14882",
|
||
"full_name": "sickwell\/CVE-2020-14882",
|
||
"owner": {
|
||
"login": "sickwell",
|
||
"id": 32671944,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32671944?v=4",
|
||
"html_url": "https:\/\/github.com\/sickwell"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sickwell\/CVE-2020-14882",
|
||
"description": "PoC for CVE-2020-14882",
|
||
"fork": false,
|
||
"created_at": "2020-10-30T18:46:34Z",
|
||
"updated_at": "2020-10-30T18:46:34Z",
|
||
"pushed_at": "2020-10-30T18:46:35Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 308782228,
|
||
"name": "CVE-2020-14882_POC",
|
||
"full_name": "GGyao\/CVE-2020-14882_POC",
|
||
"owner": {
|
||
"login": "GGyao",
|
||
"id": 38530938,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4",
|
||
"html_url": "https:\/\/github.com\/GGyao"
|
||
},
|
||
"html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882_POC",
|
||
"description": "CVE-2020-14882批量验证工具。",
|
||
"fork": false,
|
||
"created_at": "2020-10-31T01:43:54Z",
|
||
"updated_at": "2020-12-01T05:05:26Z",
|
||
"pushed_at": "2020-12-01T05:05:24Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 11,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 309098912,
|
||
"name": "Weblogic_Unauthorized-bypass-RCE",
|
||
"full_name": "ludy-dev\/Weblogic_Unauthorized-bypass-RCE",
|
||
"owner": {
|
||
"login": "ludy-dev",
|
||
"id": 70466565,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4",
|
||
"html_url": "https:\/\/github.com\/ludy-dev"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE",
|
||
"description": "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script",
|
||
"fork": false,
|
||
"created_at": "2020-11-01T13:12:27Z",
|
||
"updated_at": "2020-11-24T16:16:12Z",
|
||
"pushed_at": "2020-11-01T13:56:48Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 309655403,
|
||
"name": "CVE-2020-14882_ALL",
|
||
"full_name": "GGyao\/CVE-2020-14882_ALL",
|
||
"owner": {
|
||
"login": "GGyao",
|
||
"id": 38530938,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4",
|
||
"html_url": "https:\/\/github.com\/GGyao"
|
||
},
|
||
"html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882_ALL",
|
||
"description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
|
||
"fork": false,
|
||
"created_at": "2020-11-03T10:49:35Z",
|
||
"updated_at": "2020-12-28T17:31:33Z",
|
||
"pushed_at": "2020-12-01T05:08:41Z",
|
||
"stargazers_count": 70,
|
||
"watchers_count": 70,
|
||
"forks_count": 15,
|
||
"forks": 15,
|
||
"watchers": 70,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 309666360,
|
||
"name": "CVE-2020-14882-checker",
|
||
"full_name": "ovProphet\/CVE-2020-14882-checker",
|
||
"owner": {
|
||
"login": "ovProphet",
|
||
"id": 12277617,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12277617?v=4",
|
||
"html_url": "https:\/\/github.com\/ovProphet"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ovProphet\/CVE-2020-14882-checker",
|
||
"description": "CVE-2020-14882 detection script",
|
||
"fork": false,
|
||
"created_at": "2020-11-03T11:34:38Z",
|
||
"updated_at": "2020-11-03T11:42:04Z",
|
||
"pushed_at": "2020-11-03T11:34:47Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 309868259,
|
||
"name": "CVE-2020-14882",
|
||
"full_name": "NS-Sp4ce\/CVE-2020-14882",
|
||
"owner": {
|
||
"login": "NS-Sp4ce",
|
||
"id": 33349032,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/33349032?v=4",
|
||
"html_url": "https:\/\/github.com\/NS-Sp4ce"
|
||
},
|
||
"html_url": "https:\/\/github.com\/NS-Sp4ce\/CVE-2020-14882",
|
||
"description": "CVE-2020-14882\/14883\/14750",
|
||
"fork": false,
|
||
"created_at": "2020-11-04T03:09:13Z",
|
||
"updated_at": "2020-11-14T00:16:44Z",
|
||
"pushed_at": "2020-11-04T03:15:33Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 310303375,
|
||
"name": "cve-2020-14882",
|
||
"full_name": "mmioimm\/cve-2020-14882",
|
||
"owner": {
|
||
"login": "mmioimm",
|
||
"id": 19258899,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19258899?v=4",
|
||
"html_url": "https:\/\/github.com\/mmioimm"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mmioimm\/cve-2020-14882",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-11-05T13:12:28Z",
|
||
"updated_at": "2020-11-06T09:22:23Z",
|
||
"pushed_at": "2020-11-05T13:14:57Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 311265070,
|
||
"name": "CVE-2020-14882",
|
||
"full_name": "QmF0c3UK\/CVE-2020-14882",
|
||
"owner": {
|
||
"login": "QmF0c3UK",
|
||
"id": 29447678,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29447678?v=4",
|
||
"html_url": "https:\/\/github.com\/QmF0c3UK"
|
||
},
|
||
"html_url": "https:\/\/github.com\/QmF0c3UK\/CVE-2020-14882",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-11-09T08:03:44Z",
|
||
"updated_at": "2020-12-22T08:58:41Z",
|
||
"pushed_at": "2020-11-12T06:23:23Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 311340226,
|
||
"name": "CVE-2020-14882",
|
||
"full_name": "murataydemir\/CVE-2020-14882",
|
||
"owner": {
|
||
"login": "murataydemir",
|
||
"id": 16391655,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16391655?v=4",
|
||
"html_url": "https:\/\/github.com\/murataydemir"
|
||
},
|
||
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-14882",
|
||
"description": "[CVE-2020-14882] Oracle WebLogic Server Authentication Bypass",
|
||
"fork": false,
|
||
"created_at": "2020-11-09T13:02:43Z",
|
||
"updated_at": "2020-11-09T16:35:41Z",
|
||
"pushed_at": "2020-11-09T16:35:39Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 311887487,
|
||
"name": "CVE-2020-14882-GUI-Test",
|
||
"full_name": "AirEvan\/CVE-2020-14882-GUI-Test",
|
||
"owner": {
|
||
"login": "AirEvan",
|
||
"id": 26640179,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/26640179?v=4",
|
||
"html_url": "https:\/\/github.com\/AirEvan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AirEvan\/CVE-2020-14882-GUI-Test",
|
||
"description": "基于qt的图形化CVE-2020-14882漏洞回显测试工具.",
|
||
"fork": false,
|
||
"created_at": "2020-11-11T06:52:32Z",
|
||
"updated_at": "2020-11-11T07:22:06Z",
|
||
"pushed_at": "2020-11-11T07:19:30Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 312193698,
|
||
"name": "CVE-2020-14882-weblogicRCE",
|
||
"full_name": "corelight\/CVE-2020-14882-weblogicRCE",
|
||
"owner": {
|
||
"login": "corelight",
|
||
"id": 21672558,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21672558?v=4",
|
||
"html_url": "https:\/\/github.com\/corelight"
|
||
},
|
||
"html_url": "https:\/\/github.com\/corelight\/CVE-2020-14882-weblogicRCE",
|
||
"description": "Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 \/ CVE-2020-14750",
|
||
"fork": false,
|
||
"created_at": "2020-11-12T06:59:54Z",
|
||
"updated_at": "2020-12-02T21:43:55Z",
|
||
"pushed_at": "2020-12-02T21:43:52Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 312256179,
|
||
"name": "CVE-2020-14882",
|
||
"full_name": "x51\/CVE-2020-14882",
|
||
"owner": {
|
||
"login": "x51",
|
||
"id": 45651912,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/45651912?v=4",
|
||
"html_url": "https:\/\/github.com\/x51"
|
||
},
|
||
"html_url": "https:\/\/github.com\/x51\/CVE-2020-14882",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-11-12T11:27:39Z",
|
||
"updated_at": "2020-11-16T14:43:25Z",
|
||
"pushed_at": "2020-11-13T03:35:44Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 313643357,
|
||
"name": "CVE-2020-14882",
|
||
"full_name": "BabyTeam1024\/CVE-2020-14882",
|
||
"owner": {
|
||
"login": "BabyTeam1024",
|
||
"id": 74447452,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/74447452?v=4",
|
||
"html_url": "https:\/\/github.com\/BabyTeam1024"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2020-14882",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-11-17T14:23:23Z",
|
||
"updated_at": "2020-11-17T14:23:23Z",
|
||
"pushed_at": "2020-11-17T14:23:24Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 325240057,
|
||
"name": "CodeTest",
|
||
"full_name": "xkx518\/CodeTest",
|
||
"owner": {
|
||
"login": "xkx518",
|
||
"id": 49984697,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/49984697?v=4",
|
||
"html_url": "https:\/\/github.com\/xkx518"
|
||
},
|
||
"html_url": "https:\/\/github.com\/xkx518\/CodeTest",
|
||
"description": "CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。",
|
||
"fork": false,
|
||
"created_at": "2020-12-29T09:11:31Z",
|
||
"updated_at": "2020-12-31T10:52:24Z",
|
||
"pushed_at": "2020-12-30T05:08:16Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 7,
|
||
"score": 0
|
||
}
|
||
] |